Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCIA Topic 7 Question 52 Discussion

Actual exam question for GIAC's GCIA exam
Question #: 52
Topic #: 7
[All GCIA Questions]

Which of the following techniques is used to identify attacks originating from a botnet?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Brendan
17 hours ago
I'm going to go with D) Recipient filtering. It's a common method for blocking botnet traffic by analyzing the target addresses of suspicious network activity.
upvoted 0 times
...
Rozella
3 days ago
Hmm, I'm not sure about this one. Could it be C) Passive OS fingerprinting? That seems like a good way to detect botnets based on the infected devices' operating systems.
upvoted 0 times
...
Isabella
6 days ago
I'm not sure, but I think B) BPF-based filter could also be used to identify botnet attacks.
upvoted 0 times
...
Tegan
7 days ago
I agree with Nguyet, Passive OS fingerprinting can help identify botnet attacks.
upvoted 0 times
...
Elden
9 days ago
I think the answer is B) BPF-based filter. It's a powerful technique for identifying botnet attacks by analyzing network traffic patterns.
upvoted 0 times
...
Nguyet
14 days ago
I think the answer is C) Passive OS fingerprinting.
upvoted 0 times
...

Save Cancel